03.05.12—PKI-Based Authentication
>Control Description
Verify the identity of the individual, group, role, service, or device receiving the authenticator as part of the initial authenticator distribution. Establish initial authenticator content for any authenticators issued by the organization. Establish and implement administrative procedures for initial authenticator distribution; for lost, compromised, or damaged authenticators; and for revoking authenticators. Change default authenticators at first use. Change or refresh authenticators ⚙organization-defined frequency or when the following events occur: ⚙organization-defined events.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What documented policies and procedures address 03.05.12?
- •Who is accountable for implementing and maintaining 03.05.12 controls?
- •How frequently are 03.05.12 requirements reviewed, and what triggers updates?
- •What process ensures changes to systems maintain compliance with 03.05.12 requirements?
- •How are exceptions to 03.05.12 requirements documented and approved?
Technical Implementation:
- •What technical controls enforce 03.05.12 in your environment?
- •How are 03.05.12 controls configured and maintained across all systems?
- •What automated mechanisms support 03.05.12 compliance?
- •How do you validate that 03.05.12 implementations achieve their intended security outcome?
- •What compensating controls exist if primary 03.05.12 controls cannot be fully implemented?
Evidence & Documentation:
- •What documentation proves 03.05.12 is implemented and operating effectively?
- •Can you provide configuration evidence showing how 03.05.12 is technically enforced?
- •What audit logs or monitoring data demonstrate ongoing 03.05.12 compliance?
- •Can you show evidence of a recent review or assessment of 03.05.12 controls?
- •What artifacts would you provide during an assessment to demonstrate 03.05.12 compliance?
Ask AI
Configure your API key to use AI features.